|
|
Research on the method of substation command interaction based on third party verification |
Sun Shucai1, 2, Zhu Chenpeng1, 2 |
1. NARI Group Corporation/State Grid Electric Power Research Institute, Nanjing 211100; 2. NARI Technology Development Co., Ltd, Nanjing 211100 |
|
|
Abstract This article state a method to improve the security of control signal transmission in Substation. Which is through the introduction of third party authentication and application encryption technology. We can protect the security of the data transmission process. By using asymmetic encryption technology. And verify the authority and identity each other through drawing into the introduction of third party authentication devices to protect command information from being intercepted and tampered. And then re sealing command information with third party devices to ensure the security of transmission informations. And using dymamtic key and anthorization overdue system to further protect control security. Finally, checking the command with condition code to filter the error data effectively. This method can effectively prevent signals from being truncated or tampered. Ensure the security of data. Limiting the operation crowd, isolating illegal users, protecting information security, greatly improve the information security of substation control process.
|
Received: 10 May 2018
Published: 16 November 2018
|
|
|
|
Cite this article: |
Sun Shucai,Zhu Chenpeng. Research on the method of substation command interaction based on third party verification[J]. Electrical Engineering, 2018, 19(11): 115-118.
|
|
|
|
URL: |
http://dqjs.cesmedia.cn/EN/Y2018/V19/I11/115
|
[1] 郭正荣, 周城. SSL协议工作过程及其应用[J]. 网络安全技术与应用, 2004(10): 55-57. [2] 陈鸿星, 周媛兰. 基于不对称加密的网络信息安全对策研究[J]. 网络安全技术与应用, 2012(6): 20-22. [3] 沈昌祥, 张焕国, 王怀民, 等. 可信计算的研究与发展[J]. 中国科学: 信息科学, 2010(2): 139-166. [4] 孙勇. 陈伟, 杨义先. 嵌入式系统的可信计算[J]. 信息安全与通信保密, 2006(9): 50-52. [5] 郝长端, 刘钰, 陈树果. 智能变电站网络通信异常的分析[J]. 电气技术, 2016, 17(9): 135-138. [6] 宋磊, 罗其亮, 罗毅涂, 等. 电力系统实时数据通信加密方案[J]. 电力系统自动化, 2004, 28(14): 76-81. [7] 贾晶, 等. 信息系统的安全与保密[M]. 北京: 清华大学出版社, 1999. [8] 李熙春, 姚伟刚, 何志明. 电力数据网络的应用与安全性[J]. 江苏电机工程, 2008(3): 8-10. [9] 刘世民, 袁野, 范秉旭, 等. 智能变电站在线监测系统的研究与应用[J]. 电气技术, 2015, 16(2): 132-134. [10] 徐伟锋, 张虹, 李莉. 构建电力企业的网络信息安全[J]. 陕西电力, 2007, 35(10): 75-77. [11] 张良, 刘晓胜, 戚佳金, 等. 一种低压电力线通信改进分级蚁群路由算法[J]. 电工技术学报, 2014, 29(2): 318-324. [12] 谷志茹, 刘宏立, 詹杰, 等. 智能电网窄带OFDM通信系统噪声抑制[J]. 电工技术学报, 2014, 29(11): 269-276. |
|
|
|